Remote Monitoring & Management (RMM), or remote IT management, is a software platform that sits on a computer and enables an IT provider (such as Jam Cyber) to remotely and proactively manage a client’s computer, including networks and endpoints.
Jam Cyber implements our RMM process via an ‘agent’ which needs to be installed by all clients onto all computers. This enables us to manage cyber security installations, undertake ongoing maintenance, monitor any security breach attempts, and proactively and rapidly resolve any issues.
RMM Agent Installation Process
Jam Cyber runs the Datto Remote Monitoring and Management (RMM) system on all client computers. The Installation Process is as simple as a few clicks.
1: Download the file: AgentSetup_CLIENT_NAME.exe
All users will receive a download link in their Cyber Security Welcome Email. If you have not received your email/link, please contact your administrator.
Once you have clicked on the link, it will automatically begin to download the file needed to install the agent from your default web browser.
You will know when the file download is complete as a pop-up box will appear which is usually at the bottom of the web browser screen. Click on this file to open.
If you don’t see a file to click on, go to your file management system and open the Downloads folder and click on the file called: AgentSetup_CLIENT_NAME.exe:
2: Check and approve: AgentSetup_CLIENT_NAME.exe
Some computer systems may ask you to check before you install. If this happens, please check the program name (or app name) is Agent_SetupCLIENT_NAME.exe and the publisher is: Unknown Publisher
Once you have checked, please select ‘Run’ or ‘Run Anyway’. If you receive any other names or publishers, or you are unsure, please check with your IT Team or contact us.
Your computer will then ask if you want to allow the app to make changes to your device. Check the name is Datto RMM Agent and the verified publisher Datto Inc. If this is correct, please select ‘yes.’ If not, please check with your IT Team or contact us.
3: Silent Install
The RMM agent will then begin an automatic silent install. This means you most likely won’t notice the installation occurring in the background. Pending on the current computer condition (age, performance ability etc.) users may experience small installation issues. In the rare instance that this happens, please follow the following process:
4: Complete
Please make sure you switch off your computer at the end of the workday or, restart your computer when prompted to activate your system. We will contact you if there are any issues regarding your installation.
Cyber CEO – How to secure your passwords Using Password Management The importance of securing our passwords cannot be overstated. Cyber attacks often begin with
Cyber CEO – Phishing Emails Welcome to our phishing guide, a scam where people are tricked into giving personal information through fake emails and sites.
Cyber CEO – Managed Services Provider Welcome to Cyber CEO! This video provides an overview of Managed IT Services and their role in enhancing business
Remote Monitoring & Management (RMM) Agent
What is RMM?
Remote Monitoring & Management (RMM), or remote IT management, is a software platform that sits on a computer and enables an IT provider (such as Jam Cyber) to remotely and proactively manage a client’s computer, including networks and endpoints.
Jam Cyber implements our RMM process via an ‘agent’ which needs to be installed by all clients onto all computers. This enables us to manage cyber security installations, undertake ongoing maintenance, monitor any security breach attempts, and proactively and rapidly resolve any issues.
RMM Agent Installation Process
Jam Cyber runs the Datto Remote Monitoring and Management (RMM) system on all client computers. The Installation Process is as simple as a few clicks.
1: Download the file: AgentSetup_CLIENT_NAME.exe
All users will receive a download link in their Cyber Security Welcome Email. If you have not received your email/link, please contact your administrator.
Once you have clicked on the link, it will automatically begin to download the file needed to install the agent from your default web browser.
You will know when the file download is complete as a pop-up box will appear which is usually at the bottom of the web browser screen. Click on this file to open.
If you don’t see a file to click on, go to your file management system and open the Downloads folder and click on the file called: AgentSetup_CLIENT_NAME.exe:
2: Check and approve: AgentSetup_CLIENT_NAME.exe
Some computer systems may ask you to check before you install. If this happens, please check the program name (or app name) is Agent_SetupCLIENT_NAME.exe and the publisher is: Unknown Publisher
Once you have checked, please select ‘Run’ or ‘Run Anyway’. If you receive any other names or publishers, or you are unsure, please check with your IT Team or contact us.
Your computer will then ask if you want to allow the app to make changes to your device. Check the name is Datto RMM Agent and the verified publisher Datto Inc. If this is correct, please select ‘yes.’ If not, please check with your IT Team or contact us.
3: Silent Install
The RMM agent will then begin an automatic silent install. This means you most likely won’t notice the installation occurring in the background. Pending on the current computer condition (age, performance ability etc.) users may experience small installation issues. In the rare instance that this happens, please follow the following process:
4: Complete
Please make sure you switch off your computer at the end of the workday or, restart your computer when prompted to activate your system. We will contact you if there are any issues regarding your installation.
// Need more help?
Contact our team today.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Related Posts:
Cyber CEO – How to Secure your Passwords Using Password Management
Cyber CEO – How to secure your passwords Using Password Management The importance of securing our passwords cannot be overstated. Cyber attacks often begin with
Cyber CEO – Phishing Emails and How Do They Work?
Cyber CEO – Phishing Emails Welcome to our phishing guide, a scam where people are tricked into giving personal information through fake emails and sites.
Cyber CEO – What is Log4J hack?
Cyber CEO – What is Log4J hack? In this video, we dive into the Log4j hack, a significant vulnerability that emerged in December and was
Cyber CEO – Managed Services Provider (MSP)
Cyber CEO – Managed Services Provider Welcome to Cyber CEO! This video provides an overview of Managed IT Services and their role in enhancing business
Recent Posts
Categories